Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Opt out mechanism for internal activity recording
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

Article 13.1(.2.l): Providing security‐related information
CRA
See all related requirements and other information from tasks own page.
Go to >
Opt out mechanism for internal activity recording
First request and subsequent requests
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
First request and subsequent requests
Reporting of PHI to supervisory authorities
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Reporting of PHI to supervisory authorities
Use and disclosure of de-identified PHI
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Use and disclosure of de-identified PHI
Health oversight cooperation
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Health oversight cooperation
Disclosure of PHI for research purposes
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Disclosure of PHI for research purposes
PHI de-identification requirements
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
PHI de-identification requirements
Threat prevention disclosures of PHI
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Threat prevention disclosures of PHI
PHI re-identification controls
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
PHI re-identification controls
Defining permitted uses and disclosures of PHI
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Defining permitted uses and disclosures of PHI
Disclosure of PHI related to abuse and neglect
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Disclosure of PHI related to abuse and neglect
Minimizing the use and disclosure of protected health information
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Minimizing the use and disclosure of protected health information
Manage permitted uses, consent, and disclosures of PHI
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Manage permitted uses, consent, and disclosures of PHI
Process request and provide accounting
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Process request and provide accounting
Disclosure of PHI to public health authorities
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Disclosure of PHI to public health authorities
Disclosures for decedent and organ donation management
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Disclosures for decedent and organ donation management
Minimum necessary access to PHI
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Minimum necessary access to PHI
Legal disclosures of PHI
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Legal disclosures of PHI
Inventory and documentation of data processing agreements
Critical
High
Normal
Low
Data transfer and disclosure
17
requirements

Examples of other requirements this task affects

28. Data processor
GDPR
15.1.2: Addressing security within supplier agreements
ISO 27001
13.2.2: Agreements on information transfer
ISO 27001
A.8.2.4: Infringing instruction
ISO 27701
5.14: Information transfer
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Inventory and documentation of data processing agreements
Documentation of bases for personal data transfer for relevant partners
Critical
High
Normal
Low
Data transfer and disclosure
16
requirements

Examples of other requirements this task affects

44. General principle for transfers
GDPR
45. Transfers on the basis of an adequacy decision
GDPR
46. Transfers subject to appropriate safeguards
GDPR
47. Binding corporate rules
GDPR
48. Transfers or disclosures not authorised by Union law
GDPR
See all related requirements and other information from tasks own page.
Go to >
Documentation of bases for personal data transfer for relevant partners
Documentation of data disclosures for data stores
Critical
High
Normal
Low
Data transfer and disclosure
10
requirements

Examples of other requirements this task affects

30. Records of processing activities
GDPR
28. Data processor
GDPR
12. Transparent information, communication and modalities for the exercise of the rights of the data subject
GDPR
A.6.2: Recording of PII disclosures
ISO 27018
A.7.3.7: PII controllers' obligations to inform third parties
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Documentation of data disclosures for data stores
Legal bases for personal data transfers between different legal zones
Critical
High
Normal
Low
Data transfer and disclosure
2
requirements

Examples of other requirements this task affects

A.7.5.1: Identity basis for PII transfer between jursdictions
ISO 27701
9.5.3: Management of data transfers to third countries
TISAX
See all related requirements and other information from tasks own page.
Go to >
Legal bases for personal data transfers between different legal zones
Documenting states and international organizations receiving personal data
Critical
High
Normal
Low
Data transfer and disclosure
2
requirements

Examples of other requirements this task affects

A.7.5.2: Countries and international organizations to which PII can be transferred
ISO 27701
A.8.5.2: Countries and international organizations to which PII can be transferred
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Documenting states and international organizations receiving personal data
Records of personal data transfers to third parties
Critical
High
Normal
Low
Data transfer and disclosure
3
requirements

Examples of other requirements this task affects

A.7.5.3: Records of transfer of PII
ISO 27701
A.8.5.3: Records of PII disclosure to third parties
ISO 27701
9.5.3: Management of data transfers to third countries
TISAX
See all related requirements and other information from tasks own page.
Go to >
Records of personal data transfers to third parties
Records of personal data disclosures to third parties
Critical
High
Normal
Low
Data transfer and disclosure
4
requirements

Examples of other requirements this task affects

A.7.5.4: Records of PII disclosure to third parties
ISO 27701
HAL-07.1: Seuranta ja valvonta - tietojen käyttö ja luovutukset
Julkri
TEK-12.1: Turvallisuuteen liittyvien tapahtumien jäljitettävyys - tietojen luovutukset
Julkri
P6.2: Record of authorized disclosures of personal information
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Records of personal data disclosures to third parties
Rejecting any non-legally binding requests for personal data disclosure
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

A.8.5.5: Legally binding PII disclosures
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Rejecting any non-legally binding requests for personal data disclosure
Readiness to provide a list of data transfers to the data subject
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

P6.7: Providing an accounting of personal information upon data subjects' request
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Readiness to provide a list of data transfers to the data subject

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.